•  Kitty Hailey 6 pm - 7 pm
    Kitty Hailey

    Ethics: Why?

    She will discuss and question the need for ethics in our changing world. We are no longer the gumshoes of the 50's and we have long passed the stereotypes provided by television and movies. We are the real deal and we need to consider how Ethics fit into our lives and our profession.  For questions in advance of the session please contact Kitty through her website:

  • 7 pm - 9 pm

    Cognitive Interview/Interrogation Training & Research Development with Ken Cates and Dr. Drew Leins

    This Course of instruction and follow-on interview/interrogation research will train the PARTICIPANT in components of two compatible interview/interrogation tactical frameworks:

    Cognitive Interview (CI)

    Strategic Use of Evidence (SUE)

    Cognitive Interview (CI) training includes learning the CI framework and three techniques for getting subjects/witnesses/suspects to think differently about a critical event, enabling the investigator to elicit more information and better assess veracity. The Strategic Use of Evidence (SUE) training includes learning a CI-compatible framework for disclosing evidence in a way that takes advantage of truthful respondents’ willingness to report a full story and of lying respondents’ strategies for withholding information.  These activities involve training and follow-on research to optimize “cognitive load” (mental workload) of both the subject and the investigator in interviews/interrogations.  The overarching concept is to reduce the cognitive load for interviewers and truthful interviewees while maximizing load for deceitful/uncooperative interviewees. Participants will receive training in these new interviewing/interrogation methods which are being tested and modified for the High-Value Detainee Interrogation Group (HIG).  The HIG is a three-agency partnership, comprising the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the United States Department of Defense (DoD), that brings together intelligence professionals to train in and practice evidence-based intelligence-gathering techniques.

    This training will include the basics of:

    Conducting a Cognitive Interview: setting the social dynamic, asking open-ended questions, and then asking interviewees to think about and report their stories in different ways, including:

    Thinking about the story in a different (reverse) chronological order

    Thinking about the story in spatial terms (e.g., drawing a picture)

    Thinking about details that might not seem important (peripheral, atypical details)

    Finally, using those three methods (reverse order, space, peripheral details) to better assess credibility.

    Training in strategic use of evidence includes:

    Learning how to use a tool for evaluating the strength of evidence

    Developing a questioning strategy around the evidence

    Learning when to disclose evidence, to get a reluctant witness/suspect/guilty person/liar to say more.


    This Course of Instruction/Research event is structured as follows:

    Time commitment: Two-Three hours

    Roughly 75-90 minutes of classroom Interviewing Techniques training

    10-15 minutes of calibration exercises (simple memory tasks designed to establish a baseline for measuring cognitive load)

    One 15-30-minute interview of an experimental participant

    Prior to and during, the mock interview, participants will wear a set of physiology sensors that will allow researchers to measure their brain activity (to enable observation and measurement of cognitive load).  This will include measures of cognitive load during pre-interview memory tests (for example, recalling sequences of numbers) and during the mock interview.

    The mock interview will be broken up into segments, between which interviewers will report their perceptions of the techniques they used (e.g., how difficult they were, their effectiveness, etc.).

    At the conclusion of the training, the participant will have a working understanding of how cognitive load impacts the interviewing/interrogation process and will have a broader grasp of how and which techniques bring a positive effect to specific tactical interviews/interrogations.  If desired, investigators will receive feedback on their implementation of the experimental interview techniques.

  •  Tracie Yamauchi 7 pm - 9 pm
    Tracie Yamauchi

    Intro to Behavior Analysis for Private Investigators and Law Enforcement Officers

    This is an introductory class on Behavior Analysis. Behavior Analysis involves analysis of behavioral trends of individuals by utilizing the science of operant conditioning. By understanding how to analyze behaviors, a professional is capable of understanding purpose or motive of an individual, anticipating future behaviors and even modification of behaviors.

    This course will discuss the following:

    The science of behavior analysis

    Understanding trends

    Anticipating future behaviors

    Behavior modification


  • 8:30 am - 4:30 pm

    Legal Investigators Master Class with Kevin McClain & Jonathan Lyon

    This (8) hour conference course is designed to give the legal investigator new tools that they can use for their criminal and civil investigations. The course will be taught by two National speakers, trainers and developers of investigative training programs.

    Kevin McClain and Jon Lyon have over 60 years of investigative experience and bring to you one of the most dynamic investigative training programs ever presented.

    The Master Class will have one action packed day with 2 components that will educate not only the newly licensed investigator but even the seasoned professional.

    Component 1

    What Would You Do?

    This highly interactive powerpoint session has been developed like no other. The audience will hear from their clients, see the evidence, analyze the facts, learn new investigative analysis tools like Frame by Frame and then see how the investigative methodology was applied in various case scenarios.

    Self Defense - your client is looking at 80+ years. Watch his story

    Murder for Hire - watch undercover video of the plot as it unfolds

    Post Convictions - over 12 years defense team worked to uncover the critical evidence.

    Post Conviction 2- client was in for 23 years, what was uncovered from 1998 that everyone had missed. How did we find it

    Death Penalty - how the defense team got the CASE DISMISSED. What evidence led to this, how was it investigated and uncovered

    Component 2

    The Digital Detective (Internet and Social Media Secrets Revealed!)

    This highly interactive PowerPoint sessions will open your eyes to the powerful tool you have with the internet. Even if you have been through other OSINT training this course goes to another level. Not only will you learn new OSINT search engines but will also learn how to apply free search tools to uncover hidden data on social media channels, learn techniques and tools that you can take back to your office and apply to your cases. The participants will also learn what evidence is left behind in the digital world and how that can be applied to your investigations. Take your GOOGLE and put it on Steroids let us take your searching to another level. Did you know there is a search engine that tracks a camera, did you know there is a search engine for 911 calls, Come and learn about these and much more The sessions will include the following:

    GOOGLE on Steroids

    The Digital Fingerprint - What do you leave behind *

    Internet Sleuthing Advanced Course *

    You Tube- Your secret investigative tool and the techniques to acquire all the meta-data information *

    *What’s left behind when you surf the web?

    Be scared, be very scared of the kinds of data that is left on your computer. In this unique presentation you’ll see the data that can easily be found if one knows where to look.  If your case involves a computer this is a must-see!

    *Internet Sleuthing - advanced                                                  

    A nuts and bolts conversation of how to use multiple search engines and strategies to making the attendees faster and more efficient in finding the data that’s needed.  Once the searching engines are covered then a series of websites are shown with a slant towards the investigator or attorney on the defense team.  In addition to the above, a background check will be conducted live to show how the tools presented can apply directly to their cases.

    *You Tube Hacks                                                                                 

    With over 300 hours of video uploaded every minute to YouTube, we need to be vigilant looking for videos that can help our cases. I will show hacks on everything from on how to search better, find the right type of video, and locate videos based on time and location. There are also a number of keyboard shortcuts that can save you time that will be included. Nothing is ever really gone from the internet, so we might even see how to find videos that have been deleted. Come join us!

  •  Kelly Riddle 8:30 am - 4:30 pm
    Kelly Riddle

    Keys to Success

    This seminar is packed with insightful pointers to help a PI grow their business, increase their market exposure, and reach the next level of success.  Presented by Kelly E. Riddle who has been named the PI of the Year multiple times, One of the Top PI’s of the 20th Century, NAIS Hall of Fame Member, Recipient of the TALI Hudgins-Sallee award and most recently included in the PI Magazine’s Top PI’s of 2022. With more than 40 years’ experience, you will be given the opportunity to have open dialogue, receive tips and learn tried and true methods of success. As an added bonus, each attendee will receive a free copy of “Secrets of PI Agency Marketing and Management” and “Things They Didn’t Tell You (About Starting a PI Business)”.  Both books are industry leading marketing strategies written by Kelly.  This seminar will give you true insight into what contributed to Kelly being an industry leader as well as ways for you to climb the ladder of success!

  •  Dan Brouillette 8:30 am - 4:30 pm
    Dan Brouillette

    Initial Process Server Certification

    This seminar provides the 7-hour Civil Process Service Education Course that is required through the Judicial Branch Certification Commission (JBCC) to obtain your 2-year Process Server Certification.

    This course will break down the various rules of Civil Procedure, Case Law, and other Government Statues that a server must comply with to effectively serve legal process. The Criminal Code is also covered to prevent a Process Server from entanglement with criminal charges.

    A test will be required with a passing grade of 70% to obtain your Process Serving Certificate.

  •  TALI 4:30 pm - 5:30 pm

    Vendor Reception

  • 5:30 pm - 8:30 pm

    Dinner in Town

  •  TALI 7 pm - 8 pm

    Yacht Cruise

  •  TALI 7 am - 8:30 am


    Join TALI outside the main session room for breakfast before the Business Meeting and the sessions begin.

  •  TALI 8 am - 9:30 am

    Business Meeting

    Meet the candidates

  •  Tara Godoy 9:30 am - 10:30 am
    Tara Godoy

    Traumatic Brain Injury and Intoxication

    Head Trauma/TBI

    • Definition
    • Indications
    • Primary and Secondary Injury
    • Sign & Symptoms
    • Classifications


    • Description
    • Signs & Symptoms
    • Post-Concussive Syndrome
    • Second Impact Syndrome

    Types of Bleeds

    • Epidural Hematoma
    • Subdural Hematoma
    • Subarachnoid Hemorrhage
    • Intracerebral Hematoma

    Chronic Traumatic Encephalopathy

    • Description
    • Signs & Symptoms

    TBI in your case

    • Aggression
    • Alcohol Intoxication
    • Consent Capacity


    Upon completion of this course, the attendee will:

    • Be familiar with Traumatic Brain Injury
    • Be familiar with the types of intracranial hemorrhages associated with TBI
    • Be able to recognize the signs and symptoms of head trauma and compare them to alcohol intoxication.
    • Be familiar with the different ways of classifying brain injury severity.

  •  Alan Trevino 9:30 am - 11:30 am
    Alan Trevino

    Operating a Successful Security Company

    Description forthcoming.

  • 10:30 am - 11:00 am

    Vendor Break

  •  Aleck Ragsdale 11 am - 12 pm
    Aleck Ragsdale

    Beyond the Basics

    Join the top expert and trainer for a deep dive focused on several of the most requested features that TLOxp provides to Licensed Investigators.

    Included is a thorough review of relationship reports, vehicle sightings, social media, incarcerations and arrests and our newly released Driving Violations Search along with some tips and tricks.

    We will go over some real life cases and of course we will be answering questions…

  • 11:30 am - 12:00 am

    Vendor Break

  •  TALI 12 pm - 1 pm


    Join us for lunch to recharge before the afternoon sessions.

  •  Lorenzo Sosa 1 pm - 2 pm
    Lorenzo Sosa

    Verbal Judo

    The presenter will offer 21 tips on how to effectively communicate to obtain cooperation and necessary information from those you encounter.  Verbal Judo is communication effectiveness security officers, investigators, and law enforcement need to be able to make their words clear and effective, with cause and action.

  •  Colton Easton 1 pm - 3 pm
    Colton Easton

    Application of Digital Threat Assessment® and Emerging Trends


    • Overview of Digital Threat Assessment®
    • Reverse image search & authentication of images
    • Trends, language, and new ways that students communicate online


    Learning Objectives:


    How technology and digital platforms have evolved

    • The most popular social media platforms (Instagram, TikTok, Snapchat, etc.)
    • School Safety / Threat Assessment social media account creation and relevant searches
      • Trends, language, and new ways that students communicate online
      • Reverse image search & authentication of images

  • 2 pm - 2:30

    Vendor Break

  •  Curtis Mohler 2:30 pm - 3:30 pm
    Curtis Mohler

    Navigating Contracting and Business Best Practice/Business Pitfalls

    The University of Texas at San Antonio Procurement Technical Assistance Center (PTAC) is a specialty center at the University of Texas at San Antonio (UTSA) Institute for Economic Development (IED).  The Procurement technical assistance center is funded in part through a cooperative agreement with the Defense Logistics Agency (DLA).  The Procurement Technical Assistance Center (PTAC) assists small and large businesses with no cost advising, training, and networking with local, state, federal and DOD agencies in support of large-scale expansion. During this training PTAC will provide information on their various service platforms, business best practices, avoiding common business pitfalls, while providing new contracting trends and updates to clients, resources partners and stakeholders.”

  • 3 pm - 3:30 pm

    Vendor Break

  •  Paul Love 3:30 pm - 4:30 pm
    Paul Love

    Texas Gun Laws & Carrying into Other States

    Whether or not you can legally travel with a firearm outside your own state is often difficult to understand or determine. This discussion will help clarify the legalities of traveling from state to state with a firearm, avoiding the legal pitfalls you could encounter.

  •  Alan Trevino 3:30 pm - 4:30 pm
    Alan Trevino

    PSB Audits - Board Rules

    Description forthcoming

  •  Alan Trevino 4:30 - 5:30
    Alan Trevino

    How to Maximize the Use of TOPS System for Both Employees & Companies - Board Rules

    Description forthcoming

  •  Neil Caddell 4:30 pm - 5:30 pm
    Neil Caddell

    Behind the Curtain in the Database World

    In this day and age, the idea of a database is a polarizing subject. The thought of sensitive information being held by unknown entities is hair-raising for some, while the potential wealth of insights and understanding they provide is coveted by others. In this presentation, we’ll get a unique view of where the information that fuels these repositories comes from, talk about the proper use of databases, as well as the regulations that ensure that proper use. Additionally, we’ll discuss the ways the usage of databases fuel faster, more efficient investigations. Join me as we explore the history of databases, and what they mean for the future of Private Investigators.

  •  TALI 5:30 pm - 8:30 pm

    Dinner in Town

  •  TALI 8:30 pm - 11 pm

    Casino Night

    After enjoying dinner out in town, come back to the hotel and join us for Casino Night! We will have Texas Hold'em, Poker, Slots, 21, and a whole lot of fun!

  •  TALI 7 am - 8:30 am


    Fortify yourself with breakfast before diving into this second intense day of the conference.

  •  TALI 8 am - 9:30 am

    Business Meeting

    Business and Election Results

  •  Joseph LaBeau 9:30 am - 10:30 am
    Joseph LaBeau

    Recognizing Mental Disorders

    In this session, participants will learn what mental illness (symptoms such as depression, dissociation, mania, panic, delusion, and psychosis) looks like when presented by their clients and witnesses and the basic principles of effective encounter management.

  • 9:30 am - 10 am

    Vendor Break

  •  Alex Price 10 am - 11 am
    Alex Price


    TALI invites its members to a “New Skip-Tracing Class” by Alex “SkipGuru” Price Director of Training & Development at LocateSmarter. Alex is a nationally recognized expert on the art of Skip-Tracing, Cyber-Tracking and Human Behavior. This extensive course takes you inside the controlled chaos of the mind of the SkipGuru. This is a unique look at how to locate “skips” using modern tools, effective communication skills, and the methodologies of breaking down the types of skips into categories. As you will learn, categorizing skips is critical to your success and speed of tracking the “skip” to his/her current location. You will explore invaluable lessons including:


    “Communication Through Human Behavior”

    What is blink rate

    Understanding what is behind the mask

    Life cycle of a lie

    What is Essential Information and Where to Find It

    Social Networking Techniques

    Human Behavior Meets LPR

    What all humans have in common


  • 10:30 am - 11:00 am

    Vendor Break

  •  Dave Amis 11 am - 12 pm
    Dave Amis

    Criminals vs. Predators

    This presentation explores the differences between “criminals” and “predators”.  The distinction is important because a criminal is someone who has been caught and convicted whereas a predator is someone who preys on others, but hasn’t been caught (or uses a hole in the law to prey).  Whether the investigator’s purpose is to solve a crime, develop a protection plan, or conduct an interview, it’s important to realize that there are multiple predator methods. Examples of financial predators, sexual predators, and others will be given.  A case study asking trainees to imagine how they would commit a crime is included.

  •  Feliciano (Chano) Acevedo 11 am - 12 pm
    Feliciano (Chano) Acevedo

    How to Track the Truth with Cell Phones

    The one hour presentation is going to be about Cell Phone Forensics and Tracking.  Do’s and don'ts about tracking cell phones and how the software works and tracks cell phones.

  •  TALI 12 pm - 1 pm

    Lunch & Presentation of the "Hudgins-Sallee" and “Investigator of the Year” awards

    Join us for lunch and learn who the outstanding professionals in TALI are for the 2021-2022 season!

  •  Joseph LaBeau 1 pm - 2 pm
    Joseph LaBeau

    Mental Health for Professional Investigators

    Participants in this session will learn which mental health disorders present the greatest general threat to Professional Investigators, what these look like in the work setting, PI-specific risk and protective factors, and confidential, affordable, effective pathways to help. A self-screening tool for depression and anxiety will also be provided to attendees for their own private reference.

  •  Dave Amis 1 pm - 2 pm
    Dave Amis

    Financial Crime 101

    This presentation is an introduction to financial crimes for non-experts.  It will cover (briefly) the three primary financial documents, six serial financial predator methods, how financial crime investigations differ from other investigations, and what to do if you get a call on a financial crimes case.

    A case study of a real financial crime case will give the trainees a chance to practice their new skills.

  •  Kimberly Thompson 2 pm - 3 pm
    Kimberly Thompson

    Live Demo: Scent Dogs

    Speaker will discuss the legal requirements for use of K-9 dogs and all the many uses that K-9 dogs can enhance investigations.  Speaker will discuss how to hire a K-9 handler to assist another PI company in their investigations as a partnership.

    Attendees will observe the Handler & Narcotics Detection K-9 and Tracking K-9 conduct a live demonstration.

  • 2 pm - 2:30

    Vendor Break

  •  Michelle Mondo 2:30 pm - 4:30 pm
    Michelle Mondo

    Using Open Records and Research to Boost Your Investigation

    Knowing how to utilize open records can provide new avenues of investigation, whether the case involves civil or criminal courts, business, oil and mineral rights, skip tracing or political opposition. In this two-hour presentation, you’ll learn the basics of both state and federal open record laws, with examples, the process for open records, common exemptions to the law, tips and tricks, and the records you never knew you needed. We will also cover retention schedules, the state and national archives and university special collections. 

  • 3:30 pm - 4:30 pm

    You’ve Decided to Start your own Company – Now What?

    Establish your team of professionals

    • Business Attorney
    • CPA
    • Insurance Agent

    Entity Choice – Determine the best entity type for your company

    • Sole Proprietor
    • Partnership
    • S-Corporation (We don't recommend a C-corporation)

    Recordkeeping – all relevant documents should be stored in secure location

    • Legal Documents

    Formation docs, secretary of state docs
    Operating agreements

    • Tax & Accounting Information

    IRS Correspondence
    Banking Information
    W9s, EIN information, payroll & personnel


    • How/Where to Store

    Physical – locked file cabinet
    Digital – password protected files/location on computer
    Backups – should be regular & systematic
    Easy solution – cloud storage, dropbox, Google docs, etc

    Accounting & Bookkeeping Procedures

    • Open separate business bank account – mandatory!
    • Determine how you will keep your books

    Best: Pick an easy-to-use accounting software. QuickBooks, Wave, Xero
    Okay: use an excel worksheet to track revenue & expenses
    Worst: shoebox full of receipts that your CPA will have to sort through and read your mind at tax time

    Your company’s personnel & payroll

    • Yourself & other owners
    • Office or Administrative staff
    • Fieldwork – Employees vs Contract Workers?

  •  Dan Brouillette 8:30 am - 4:30 pm
    Dan Brouillette

    Maximizing Server Effectiveness (Civil Process Server CE)

    Impact on the Judicial Process
    The judicial process is explained from filing a petition, to the process server receiving and attempting to execute the document, thru what happens after a Judgement is granted. The goal of this class is to emphasize the positive or negative impact a process server’s work can have on a case as it progresses. We will explain the costs & consequences to the plaintiff, defendant or the process server resulting from any oversights or errors made during the case progression, as well on how to avoid pitfalls that could harm the Defendant or Plaintiff.

    Types of Service Documents
    This seminar is designed to show the server the differing documents they may be called upon to deliver during their career. We will explain the purpose of the varying service documents used throughout the Justice, County, District & Federal systems; breakdown the time limits for service of those documents; and when they should be filed back with the court when required.

    What to Know Before You Go
    Preparation is key to creating a professional and positive experience for the process server before beginning the steps of making attempts to deliver legal documents. This class focuses on the appropriate equipment, tools, organization and research that will ensure the process server is prepared and well informed prior to stepping into the field.

    Safety First!
    We will be presenting practical information regarding safety for process servers. A discussion regarding tools and equipment to increase safety; how a server can perform a Risk Assessment; the buddy system; and an overview of Erin’s List as it relates to utilizing the database and participating in the program.

    Maximize Your Time & Attempts
    As a process server it is important to be as efficient and effective as possible. This class will focus on the elements involved in creating a successful initial attempt. Covering such topics as first impressions, attention to details and surroundings when on location. What are important things to note? How making assumptions can cost you time and prevent you from successfully delivering the document.

    Communication Counts
    As process servers we encounter all personality types. Verbal and non-verbal communication skills are essential. This seminar covers topics on personality types; how to pose questions to obtain a positive response; how to engage in a conversation without sounding demanding or threatening; and how to read body language to help the server gain the information needed for successful completion of delivery or proving diligence.

    Fight or Flight (De-Escalation)
    What to do when a person begins to escalate. We are a stranger walking up to someone's door and we're not normally bringing good news. This course focuses on techniques used to de-escalate a situation when someone becomes agitated or threatening. During this session we will discuss and demonstrate how to avoid conflicts, physical confrontation, injury or arrest. This course will also field questions from the audience regarding trends or problems they are experiencing.

    Mechanics of Diligence
    This seminar is designed to help create good habits in what is needed to prove the diligence you performed will be valid should it ever be challenged in court, whether the serve is successful or not. In this course we will cover what diligence looks like and its importance; what the law requires to prove up service; customer expectations regarding diligence; and how to document the diligence you performed.

  •  Michelle Mondo 8:30 am - 12:30 pm
    Michelle Mondo

    A Deep Dive into Open Records

    Now that you have learned the basics in the two-hour presentation, it’s time to learn even more advanced techniques and knowledge about open records, including some that were not mentioned previously. In these four hours we will take an hour per subject to look more closely at how to find documents in the following categories: first responders (police and fire); court records (from speeding tickets to U.S. Supreme Court); business records; and municipal/political/judicial records to know for political opposition investigations.


    Hour One: First Responders

    We will look in-depth at police and fire audio, video, reports, run sheets, and the type of communication you want to request. This will also include the documents you can get about officers, firefighters and other first responders if they have been punished.

    Hour Two: Court Records

    The civil and criminal court system can be an absolute maze if you are trying to locate documents. In this hour we will look at both systems, where records reside, how and from whom you request the records you need. The hour will cover appeals courts as well and touch on the Supreme Court.

    Hour Three: Business Records

    Learn about the types of records to track businesses and business ownership, including websites to help with your searches.

    Hour Four: Municipal/Political/Judicial Records for Political Opposition

    These records will not help just with political opposition, but they are definitely a go-to for those looking to do oppo research. This hour will include info on requesting communication, personnel records, audits, and other categories that may help. We will discuss the exemptions that will impact this the most. There will also be time for questions.

  •  Samantha Santiago 1:30 - 5:30
    Samantha Santiago

    A Deep Dive into Social Media

    Speaker will discuss how to gather and analyze valuable intelligence from several social media platforms, namely Facebook, Instagram, Tik Tok, Snapchat, LinkedIn, and Twitter. Speaker will briefly discuss the history and basics of each platform, then discuss in detail how Investigators can most effectively locate, analyze, and preserve key information. Speaker will also relay tips and tricks, including useful third-party websites that can help analyze large amounts of data, corroborate information, and/or present new leads or avenues to explore.


    Hour One: Creating Fictitious Online Personas

    Before you can collect useful information about your target(s) on social media, you need to ensure you are operating safely online. Learn how to securely and anonymously create fictitious online personas (also known as “sock puppets” or “online avatars”) to gather actionable information on your target(s). Session will discuss “sanitizing” your computer and browser, using a VPN and non-attributable phones and emails, and establishing a solid cover story. Session also details best practices when conducting online undercover operations.


    Hour Two: Facebook and Instagram

    Learn various tricks of the trade to find useful information on Facebook and Instagram, such as “reverse engineering” a target with a common name to find the existence of an account. Discuss how to use the ever-increasing integration of social media platforms to your advantage.


    Hour Three: Tik Tok and Snapchat

    Learn about Tik Tok, the fastest growing social media platform worldwide. Speaker will discuss the nuances of using the mobile app versus desktop version, how to download relevant content for preservation, and recent privacy concerns. Speaker will also discuss Snapchat and some of its’ useful features, like Snapmap, that Investigators can exploit for surveillance and/or to corroborate someone’s whereabouts and activities.


    Hour Four: LinkedIn and Twitter

    Learn the different ways to find relevant data of interest on LinkedIn. Learn Twitter-specific third-party tools that can quickly and effectively search keywords and analyze thousands of tweets, find connections between people, and compile metrics on targeted accounts of interest.